Lucene search

K

Waitress Security Vulnerabilities

cve
cve

CVE-2022-31015

Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing.....

6.5CVSS

5.5AI Score

0.001EPSS

2022-05-31 11:15 PM
89
5
cve
cve

CVE-2022-24761

Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and...

7.5CVSS

7.4AI Score

0.002EPSS

2022-03-17 01:15 PM
117
5
cve
cve

CVE-2020-5236

Waitress version 1.4.2 allows a DOS attack When waitress receives a header that contains invalid characters. When a header like "Bad-header: xxxxxxxxxxxxxxx\x10" is received, it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and...

6.5CVSS

6.2AI Score

0.001EPSS

2020-02-04 03:15 AM
71
cve
cve

CVE-2019-16792

Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two...

7.5CVSS

7.1AI Score

0.002EPSS

2020-01-22 07:15 PM
144
4
cve
cve

CVE-2019-16789

In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special...

8.2CVSS

7.4AI Score

0.002EPSS

2019-12-26 05:15 PM
196
5
cve
cve

CVE-2019-16786

Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with...

7.5CVSS

7.2AI Score

0.003EPSS

2019-12-20 11:15 PM
243
5
cve
cve

CVE-2019-16785

Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if a front-end server....

7.5CVSS

7.3AI Score

0.021EPSS

2019-12-20 11:15 PM
236
5